How Russian threats turned this country into the go-to expert on cyber defense
When people like the German Chancellor Angela Merkel or the King of Belgium want to learn more about cybersecurity, they go to Estonia......»»
Comcast Business MDR limits the impact of cyber threats
Comcast Business has expanded its cybersecurity portfolio with the launch of its Comcast Business Managed Detection and Response (MDR) solution. The solution combines an advanced security analytics platform and Security Operations Center (SOC) to hel.....»»
GISEC Global 2024 video walkthrough
In this Help Net Security video, we take you inside GISEC Global, which is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. The video features the following vendors: Sophos, Waterfall Security Solutions, UAE Cyber Securi.....»»
AI set to play key role in future phishing attacks
A staggering increase in QR code phishing (quishing) attacks during 2023 saw them skyrocket up the list of concerns for cyber teams globally, according to Egress. Attacks were both prolific and highly successful, demonstrating how cybercriminals effe.....»»
Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
For nearly four years and perhaps even longer, Forest Blizzard (aka Fancy Bear, aka APT28) has been using a custom tool that exploits a specific vulnerability in Windows Print Spooler service (CVE-2022-38028). Dubbed GooseEgg, the tool is a launcher.....»»
Entrust protects users against fraud, phishing and other account takeover attacks
Entrust announced a single-vendor enhanced authentication solution that integrates identity verification (IDV) and identity and access management (IAM) to fight deepfakes, phishing, account takeover (ATO) attacks and other threats. By enhancing Entru.....»»
Column: What’s under the Tesla Cybertruck’s skin? Teardown expert Sandy Munro shows us
Teardown expert Sandy Munro bought two Cybertrucks, one to tear down piece by piece and examine, and the other to drive. Munro, 75, detailed for Automotive News much of what he's seen of the Cybertruck's underpinnings......»»
Column: Column: What’s under the Tesla Cybertruck’s skin? Teardown expert Sandy Munro shows us
Teardown expert Sandy Munro bought two Cybertrucks, one to tear down piece by piece and examine, and the other to drive. Munro, 75, detailed for Automotive News much of what he's seen of the Cybertruck's underpinnings......»»
Transporting hazardous materials across the country isn"t easy—that"s why there"s a host of regulations in place
Ever wonder what those colorful signs with symbols and numbers on the backs of trucks mean? They're just one visible part of a web of regulations that aim to keep workers and the environment safe while shipping hazardous waste......»»
Tesla Cybertruck is loaded with advanced technology, says teardown expert Sandy Munro
Teardown expert Sandy Munro bought two Cybertrucks, one to tear down piece by piece and examine, and the other to drive. Munro, 75, detailed for Automotive News much of what he's seen of the Cybertruck's underpinnings......»»
Scientists stencil-paint carbon nanotube components for flexible transparent electronics
Researchers from Skoltech, MIPT, and elsewhere have found a fast and inexpensive way to create geometric patterns in carbon nanotube films. The resulting films turned out to have superior properties for manufacturing components for 6G communication d.....»»
Veeam acquires Coveware to boost its ransomware protection capabilities
Veeam Software announced the acquisition of Coveware, a provider in cyber-extortion incident response. It brings ransomware recovery and first responder capabilities to further strengthen Veeam’s radical resilience solutions for customers. Coveware.....»»
Stellar Cyber launches MITRE ATT&CK Coverage Analyzer
Stellar Cyber launched the MITRE ATT&CK Coverage Analyzer, enabling users to visualize the impact of data source changes on their ability to detect threats in their specific environments. With this new tool, free of charge to all existing customers,.....»»
Veritas enhances cyber resilience with AI-powered solutions
Veritas Technologies announced artificial intelligence (AI)-powered advancements in Veritas 360 Defense. With the self-defending data protection solution, a generative AI-powered operational copilot and new ecosystem partners, organizations can more.....»»
Trellix Email Security for Microsoft Office 365 improves email defense
Trellix announced Trellix Email Security for Microsoft Office 365. Combining threat detection, threat intelligence, and security expertise, Trellix offers Microsoft Office 365 customers more cost-effective alternative to Microsoft Defender for Office.....»»
Windows vulnerability reported by the NSA exploited to install Russian malware
Microsoft didn't disclose the in-the-wild exploits by Kremlin-backed group until now. Enlarge (credit: Getty Images) Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attack.....»»
Windows vulnerability reported by the NSA exploited to install Russian backdoor
Microsoft didn't disclose the in-the-wild exploits by Kremlin-backed group until now. Enlarge (credit: Getty Images) Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attack.....»»
Trend Micro launches AI-driven cyber risk management capabilities
Trend Micro unveiled AI-driven cyber risk management capabilities across its entire flagship platform, Trend Vision One. This seamlessly integrates more than 10 industry technology categories into one offering, empowering security, cloud and IT opera.....»»
Binary Defense enhances BDVision to improve security for SMBs
Binary Defense announced several important updates to BDVision, the company’s real-time detection and containment Managed Endpoint Detection & Response (mEDR) solution. These critical updates – which include new deception technology, artificial i.....»»
How to improve response to emerging cybersecurity threats
Cyber resilience is a top priority for global organizations, and understanding threats plays a crucial role in building and maintaining a layered security approach. This Help Net Security round-up presents excerpts from previously recorded videos fea.....»»
Why are groups of university students modifying Cadillac Lyriq EVs?
The competition provides a steady stream of experienced graduates to the auto industry. Enlarge / For the previous EcoCar 3 competition, student teams turned Camaro sportscars into hybrids. For the EcoCar EV challenge, their job.....»»